Professional Documents
Culture Documents
Cryptography 130919084510 Phpapp02
Cryptography 130919084510 Phpapp02
CRYPTOGRAPHY
Presented By : Shibani
Guided By : Asst.
Presented By : Sidharth
Sarangi Prof. Smita
Mahapatra
IT Branch,
Regd
no.
ECE Branch, Regd
no.
Mohanty
Guided
By : Prof. X
0901298191
1001289324
1
OVERVIEW
Cryptography
Vocabulary
Encryption &
Decryption
Transmission
Technique
Symmetric
Cryptography
Asymmetric
Cryptography
WHAT IS CRYPTOGRAPHY ?
VOCABULARY
VOCABULARY
bla-bla
TRANSMISSION TECHNIQUE
Cipher
ciphertext
msg
msg
decoder
encoder
Cipher text in
(ciphertext
Plain text in
- out
- plaintext out)
Plain
text in
in(plaintext
Cipher text ciphertext
out out)
cmb-cmb
bla-bla
eavesdropper
unde
rstand
Should (should
understand
NOTHING
about
the messagethemsg)
nothingabout
nothing
8
CLASSIFICATION
Cryptography
Symmetric key
cryptography
ryptography)
Classical
cryptography
Transposition
cipher
Asymmetric key
cryptography
(Public key
Modern
cryptography
Substitution
Stream
cipher
cipher
Block
cipher
BOTH SHOULD
KNOW THE KEY
10
TRANSPOSITION CIPHER
In
classical
cryptography,
a
transposition cipher changes one
character from the plaintext to
another i.e. the order of the characters
is changed.
11
SUBSTITUTION CIPHER
12
STREAM CIPHER
13
BLOCK CIPHER
15
CRYPTANALYSIS
16
CRYPTANALYSIS TECHNIQUES
ACOUSTIC CRYPTANALYSIS
COUNTER MEASURES
19
CONCLUSION
20
REFERENCE
Yang,
Sarah
(14
September
2005),"Researchers recover typed text
using
audio
recording
of
keystrokes",UC Berkeley News.
Adi Shamir & Eran Tromer."Acoustic
cryptanalysis". Blavatnik School of
Computer Science, Tel Aviv University.
Retrieved 1 November 2011.
21
Thank
you.
22